Panopticlick
panopticlick.eff.orgCheck if your browser safe against tracking. Analyzes how well your browser and add-ons protect you against online tracking techniques, and if your system is uniquely configured—and thus identifiable.
- Homepage: panopticlick.eff.org
- GitHub: github.com/EFForg/cover-your-tracks
- Web info: web-check.xyz/results/panopticlick.eff.org
Panopticlick Source Code
Author
Description
Is your browser safe against tracking?
Homepage
https://coveryourtracks.eff.org/License
AGPL-3.0
Created
02 Nov 15
Last Updated
29 Sept 24
Primary Language
JavaScript
Size
6,347 KB
Stars
191
Forks
36
Watchers
191
Language Usage
Star History
Top Contributors
- @Hainish (260)
- @lschatzkin (233)
- @ChrisAntaki (33)
- @maximillianh (14)
- @dependabot[bot] (5)
- @wgreenberg (5)
- @cowlicks (1)
- @lenazun (1)
- @martijnvermaat (1)
- @OliverCole (1)
- @esoterik (1)
- @eenblam (1)
Recent Commits
- William Budington (16 Apr 24)
Avoid math error where epoched total == 0, return useful error to caller
- William Budington (16 Apr 24)
Merge branch 'JOSCHLINER-patch-1'
- William Budington (16 Apr 24)
Hide overflow (closes #99)
- William Budington (16 Apr 24)
Update python dependencies
- William Budington (16 Apr 24)
Remove obsolete version from docker-compose.yml
- William Budington (16 Apr 24)
Rebuild static resources (via 'npm run build')
- William Budington (16 Apr 24)
npm update
- William Budington (16 Apr 24)
Documentation should reflect move to python 3.11
- William Budington (11 Apr 24)
Updade python dependencies to latest (sans flask), python to 3.11, and rebuild docker images (updating package-lock.json)
- William Budington (27 Mar 23)
Adding .gitignore'd anonymity pool data path
- schatzkin (22 Mar 23)
fixing small typo found by user (#91)
- William Budington (30 Sept 22)
Update npm front-end dependencies. Restructure js includes to be module-friendly
- William Budington (29 Sept 22)
Compile style.css from sass
- William Budington (09 Sept 22)
Proper capitalization for Lockdown Mode
- William Budington (07 Sept 22)
Bugfix: shorter result for shorter db column 'loads_remote_fonts'
- William Budington (02 Sept 22)
Add a note if we've determined you're using iOS 16 in lockdown mode
- William Budington (02 Sept 22)
Introduce a new whorl (v3), 'loads_remote_fonts'
- William Budington (01 Sept 22)
Fixing incompatability issue between latest eventlet and gunicorn
- William Budington (01 Sept 22)
Fix characteristic menu dropdown selection
- William Budington (01 Sept 22)
Upgrade fontend and backend dependencies, switch to pipenv dependency tracking, update README.md and Dockerfile to use pipenv
- William Budington (12 Apr 22)
Remove DNT result template from main.py as well
- William Budington (12 Apr 22)
Downgrade python to 3.9 for gunicorn
- William Budington (12 Apr 22)
Staple eventlet version
- William Budington (11 Apr 22)
Upgrade to python 3.10 and update python dependencies
- William Budington (11 Apr 22)
Update dependencies
- William Budington (11 Apr 22)
Remove DNT policy clause from summary sentence
- William Budington (13 Apr 21)
Fix typo
- schatzkin (02 Apr 21)
replacing old privacy badger links with privacybadger.org (#70) * replacing old privacy badger links with privacybadger.org * Content update (#71) * text updated on front page * text updated on learn page * text update for basic results and results sidebar * updating learn callout text * restoring do not track results, needed for "our tests indicate that..." summary * updated header results * update browser fingerprinting text * updated fingerprinting metrics * updated hardware text * updating about page * adding anchor tag to Simple Suggestions on learn page * updates to detailed results * Sorted (grouped) results (#72) * trying new sort function * all results group sorted * moving <hr> * adding group headers * hiding grouping sort parameter * reordering header styles for better readability * reordering results per specs * sorting via data-group attribute instead of span * removing browserspy and breadcrumbs from thank you. (#75) * replacing old privacy badger links with privacybadger.org
- schatzkin (16 Mar 21)
removing browserspy and breadcrumbs from thank you. (#75)
- schatzkin (03 Mar 21)
Sorted (grouped) results (#72) * trying new sort function * all results group sorted * moving <hr> * adding group headers * hiding grouping sort parameter * reordering header styles for better readability * reordering results per specs * sorting via data-group attribute instead of span
Panopticlick Website
Website
301 Moved Permanently
Redirects
Redirects to https://coveryourtracks.eff.org/
Security Checks
1 security checks failed (65 passed)
- External Redirect Detected
Server Details
- IP Address 173.239.79.206
- Hostname irc.eff.org
- Location Berkeley, California, United States of America, NA
- ISP Unwired
- ASN AS32354
Associated Countries
- US
Saftey Score
Website marked as safe
100%
Blacklist Check
panopticlick.eff.org was found on 0 blacklists
- ThreatLog
- OpenPhish
- PhishTank
- Phishing.Database
- PhishStats
- URLhaus
- RPiList Not Serious
- AntiSocial Blacklist
- PhishFeed
- NABP Not Recommended Sites
- Spam404
- CRDF
- Artists Against 419
- CERT Polska
- PetScams
- Suspicious Hosting IP
- Phishunt
- CoinBlockerLists
- MetaMask EthPhishing
- EtherScamDB
- EtherAddressLookup
- ViriBack C2 Tracker
- Bambenek Consulting
- Badbitcoin
- SecureReload Phishing List
- Fake Website Buster
- TweetFeed
- CryptoScamDB
- StopGunScams
- ThreatFox
- PhishFort
Website Preview
Panopticlick Reviews
More Online Tools
-
Checks if your credentials (Email address or Password) have been compromised in a data breach. See also Firefox Monitor.
-
Checks how many, and which trackers any Android app has. Useful to understand how data is being collected before you install a certain APK, it also shows which permissions the app asks for.
-
Show how identifiable you are on the Internet by generating a fingerprint based on device information. This is how many websites track you (even without cookies enabled), so the aim is to not be unique.
-
Analyzes emails, checking the URLs and creating a SHA256 and MD5 hash of attachments, with a link to VirusTotal. To use the service, just forward a potentially malicious or suspicious email to [email protected], and an automated reply will include the results. They claim that all email data is purged after analysis, but it would be wise to not include any sensitive information, and to use a forwarding address.
-
Shows which of personal identity data is being leaked through your browser, so you can better protect yourself against fingerprinting.
-
Shows your IP address, and other associated details (location, ISP, WebRTC check, DNS, and lots more).
-
Displays, and removes Meta and EXIF data from an uploaded photo or document.
-
Check where a suspicious URL redirects to (without having to click it). Lets you avoid being tracked by not being redirected via adware/tracking sites, or see if a shortened link actually resolves a legitimate site, or see if link is an affiliate ad.
-
Checks if a given website is blocked by filters applied by your mobile and broadband Internet Service Providers (ISP).
-
Analyses a potentially-suspicious web resources (by URL, IP, domain or file hash) to detect types of malware (note: files are scanned publicly).
-
Scan websites and shows a security overview, relating to factors such as HTTPS, domain info, email data, www protocols and so on.
-
Checks if a website or business is a scam, before buying something from it.
-
Ever been uninstalling programs from your Windows PC and been unsure of what something is? Should I Remove It is a database of Windows software, detailing whether it is essential, harmless or dangerous.
-
Generates temporary disposable email address, to avoid giving your real details.
-
Tool for analyzing email headers, useful for checking the authenticity of messages, as well as knowing what info you are revealing in your outbound messages.
-
Google testing out a new tracking feature called Federated Learning of Cohorts (aka "FLoC"). It currently effects 0.5% of Chrome users, this tool developed by the EFF will detect if you are affected, and provide additional info on how to stay protected.
-
A tool from Netcraft, for analysing what any given website is running, where it's located and information about its host, registrar, IP and SSL certificates.
About the Data: Panopticlick
API
You can access Panopticlick's data programmatically via our API.
Simply make a GET
request to:
https://api.awesome-privacy.xyz/security-tools/online-tools/panopticlick
The REST API is free, no-auth and CORS-enabled. To learn more, view the Swagger Docs or read the API Usage Guide.
About the Data
Beyond the user-submitted YAML you see above, we also augment each listing with additional data dynamically fetched from several sources. To learn more about where the rest of data included in this page comes from, and how it is computed, see the About the Data section of our About page.
Share Panopticlick
Help your friends compare Online Tools, and pick privacy-respecting software and services.
Share Panopticlick and Awesome Privacy with your network!